Cart (Loading....) | Create Account
Close category search window
 

Multiparty authenticative mechanisms for network-mediated document-object conferencing and collaborative processing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Goh, A. ; Sch. of Comput. Sci., Univ. Sains Malaysia, Penang, Malaysia ; Ng, C.K. ; Yip, W.K.

A cryptography-based authenticative framework to support document conferencing is required to address functional complications of unstructured documents, in particular: (1) multi-party authoring characterised by an evolving transactional document, and (2) multi-party authentication on the completed document. Authoring-phase authentication would be provided by: (1) document-object hash trees and (2) a Rabin signature (M.O. Rabin, 1979), respectively providing structural detail for modifications and optimal computationally-efficient verifiability. The authenticative phase would in turn be supported by the Takaragi-Miyazaki-Takahashi (1998) multi-signature protocol featuring a group-associated key pair, the private portion of which is divided into verifiable partial key shares using Feldman-Pedersen verifiable secret sharing (T.P. Pedersen, 1991). Verifiable partial signature affixation can therefore be executed on a completed transactional document-object, with the final result being a simple third-party verifiable discrete logarithm signature. The featured multi-protocol framework would be operationally robust due to its limited dependance on unconditionally trusted transactional entities, which is required for the one-off generation and distribution of multi-signature key parameters

Published in:

TENCON 2000. Proceedings  (Volume:3 )

Date of Conference:

2000

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.